CSA Talk May 2018: Difference between revisions

From Federal Burro of Information
Jump to navigationJump to search
(Created page with " == A Grab Bag of Security Practices == * root mfa * using roles to access account from a cetnral place. * using peering to central manage * using config rules * IAM policy b...")
 
No edit summary
Line 1: Line 1:
Sca


== A Grab Bag of Security Practices ==
== A Grab Bag of Security Practices ==

Revision as of 17:46, 17 April 2018

Sca

A Grab Bag of Security Practices

  • root mfa
  • using roles to access account from a cetnral place.
  • using peering to central manage
  • using config rules
  • IAM policy best practices.
  • Auditing and forensics.
    • the cloudtrail -> s3 -> cloudwatch trinity
    • s3 replication
    • s3 imutablity
    • Anomaly detection datadog
  • anti patterns
    • egress backhaul.
  • Partners and Vendor: what can my vendor do?